Skip to main content

Home/ Math 1111: Cryptography/ Group items tagged nytimes

Rss Feed Group items tagged

Annie Vreeland

How 18th-Century Copiale Cipher Was Cracked - 0 views

  •  
    A description of how the Copiale Cipher was cracked. 
Hannah Lee

Computer Scientists Break Security Token Key in Record Time - NYTimes.com - 0 views

  •  
    A breach in supposedly secure keys given to employees by private companies vindicates previous warnings by cryptographers that companies should use more difficult keys, and that companies have not been cautious enough using such keys because of their assumed security.
Ryan McLaughlin

Britain's GCHQ Uses Online Puzzle to Recruit Hackers - NYTimes.com - 0 views

  •  
    Instead of hiring "upper-class twits from Oxford and Cambridge," A government communications agency tried a new angle on recruiting hackers. They decided to combat hackers with other experienced hackers by posting an online puzzle and offering a job interview to those who solved it.
Derek Bruff

Steal This Hook? Girl Talk Flouts Copyright Law - NYTimes.com - 0 views

  •  
    Here's a 2008 New York Times piece on Girl Talk. Whether or not his fair use argument would hold up in court, it seems clear that music labels aren't particularly interested in suing him for his all-sample approach to music creation.
Allison Molo

Hackers Breach Security of HealthCare.gov - NYTimes.com - 0 views

  •  
    Check out this article! It's about a recent security breach of heathcare.gov that was made possible due to a test server with a default password that hadn't been changed and a lack of regular security scans.
Derek Bruff

Crimes, iPhones and Encryption - Room for Debate - NYTimes.com - 0 views

  •  
    The New York Times put together a virtual debate over the Apple/FBI conflict.
Derek Bruff

Does Europe Need a New Surveillance System? - Room for Debate - NYTimes.com - 1 views

  •  
    Today's New York Times features a debate of sorts over the value of increased surveillance after the Paris attacks. Click through for five different views on this complex issue.
j_olsen

Murder Suspect Has Witness - A MetroCard - NYTimes.com - 0 views

  •  
    This article details how MetroCard tracking is used in solving crimes, which is somewhat similar to the FastPass tracking in Little Brother.
Derek Bruff

Nicolas Cage Agrees to Return Stolen Dinosaur Skull to Mongolia - NYTimes.com - 0 views

  •  
    Perhaps the best headline ever.
Marco Tiburcio

Step 1: Post Elusive Proof. Step 2: Watch Fireworks. - 0 views

  •  
    Online collaboration over the claimed proof "P versus NP" demonstrates the potential of the internet in the field of mathematical and intellectual research alike. The proof "P versus NP," if verified, would make obsolete modern cryptography, which works under the assumption that P does not equal NP.
Malak Elmousallamy

Hacked Chamber of Commerce Opposed Cybersecurity Law - 0 views

  •  
    This is another example of the debate on whether security or privacy is more important.
Malak Elmousallamy

Pigeon Code Baffles British Cryptographers - 0 views

  •  
    Britain's code-breakers acknowledged Friday that an encrypted handwritten message from World War II, found on the leg of a long-dead carrier pigeon in a household chimney in southern England, has thwarted all their efforts to decode it since it was sent to them last month.
mariannas

Facial Scanning Is Making Gains in Surveillance - 0 views

  •  
    Facial scanning isn't quite to the point where it could be reliably implemented in a school, but it's not far off either.
1 - 20 of 52 Next › Last »
Showing 20 items per page